Server Side Template Injection with Jinja2

Join Gus on a deep dive into crafting Jinja2 SSTI payloads from scratch. Explore bypass methods and various exploitation techniques in this insightful post.
What is Social Engineering? Definitions Examples & Tips

A Penetration Testing Pro shows how social engineering works in the real world. Hackers techniques, real-life examples and practical tips on staying safe.
BlueKeep Exploits: Addressing worrying aspects many security teams overlook

Defend against BlueKeep’s looming threats. Insights on securing systems from potential widespread attacks and common BlueKeep exploits. This blog will help you stay informed of threats.
We solved Our Problem With Audit Postgres and Elasticsearch

Discover the challenges of managing extensive database audits and our innovative solution using Elasticsearch, a custom Node tool, and PostgreSQL triggers.
The Future of Penetration Test Reporting is here now

Explore the future of pentest reports as we unveil the next-generation approach. Discover what’s on the horizon for cybersecurity assessments and reporting.
Discover Buffer Overflow – Easy Chat Server ready for OSCP

Explore the buffer overflow vulnerability in Easy Chat Server 3.1. Gain insights into this security issue and how to successfully these mitigate risks.
Careless With Curl? Don’t Be. Curl Your Scripts First.

Gain insight and learn responsible cURL usage and secure scripting practices in this essential OnSecurity blog on web requests and data transfers. Read now.
Rapid7’s Project Sonar uncovered by Security Engineer

Discover the process and insights behind making Rapid7’s Project Sonar accessible and searchable. Explore the journey now within cybersecurity now.
Email Phishing Explained – ‘Foot In The Door’ For Hackers

Get insights into email phishing from an Ethical Hacking Veteran. Learn common tactics with real-world examples and practical tips for businesses & Individuals
Investigation: Pentesting PostgreSQL with SQL Injections

This post revolves around general analysis, exploitation and discovery of SQL Injection vulnerabilities in app using the Postgres DMBS. We will take a look into bypass methods for web application […]